MCQOPTIONS
Saved Bookmarks
This section includes 12 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
_____________ is an encryption program or add-ons which provides cryptographic privacy & authentication for email communication. |
| A. | Powerful Good Privacy |
| B. | Pretty Good Privacy |
| C. | Pretty Good Encryption |
| D. | Pretty Strong Encryption |
| Answer» C. Pretty Good Encryption | |
| 2. |
Which of them is not a disadvantage of active online attack? |
| A. | Takes a long time |
| B. | Easily and automatically detected |
| C. | Need high network bandwidth |
| D. | Need the patience to crack |
| Answer» C. Need high network bandwidth | |
| 3. |
Which of the following is a tool to monitor outgoing traffic of target PC’s email and intercept all the emails sent from it? |
| A. | Wireshark |
| B. | Advanced Stealth Email Redirector |
| C. | MS Outlook |
| D. | Cisco Jabber |
| Answer» C. MS Outlook | |
| 4. |
In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1 against victim’s system/account. |
| A. | passive online |
| B. | active online |
| C. | offline attack |
| D. | non-electronic |
| Answer» C. offline attack | |
| 5. |
PGP is abbreviated as _______________ |
| A. | Pretty Good Privacy |
| B. | Powerful Good Privacy |
| C. | Protocol Giving Privacy |
| D. | Pretty Good Protocol |
| Answer» B. Powerful Good Privacy | |
| 6. |
Hackers cannot do which of the following after compromising your phone? |
| A. | Shoulder surfing |
| B. | Accessing your voice mail |
| C. | Steal your information |
| D. | Use your app credentials |
| Answer» B. Accessing your voice mail | |
| 7. |
Saving passwords in the browser is a good habit. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» C. May be True or False | |
| 8. |
Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails. |
| A. | trojans, redirected malicious URLs |
| B. | antivirus, patches |
| C. | cracked software, redirected malicious URLs |
| D. | malware, security patches |
| Answer» B. antivirus, patches | |
| 9. |
Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep. |
| A. | Biometric |
| B. | PIN-based |
| C. | Alphanumeric |
| D. | Short |
| Answer» B. PIN-based | |
| 10. |
Activate _____________ when you’re required it to use, otherwise turn it off for security purpose. |
| A. | Flash Light |
| B. | App updates |
| C. | Bluetooth |
| D. | Rotation |
| Answer» D. Rotation | |
| 11. |
_________________ can be alternatively termed as password guessing attack. |
| A. | passive online |
| B. | active online |
| C. | offline attack |
| D. | non-electronic |
| Answer» C. offline attack | |
| 12. |
Which of the following case comes under victims’ list of an active online attack? |
| A. | Strong password based accounts |
| B. | Unsecured HTTP users |
| C. | Open authentication points |
| D. | Logged in systems and services |
| Answer» D. Logged in systems and services | |